Subscription to the full report on a daily basis can be obtained:
Send an eMail to dhsdailyadmin@mail.dhs.osis.gov with the subject "DHS Daily Open Source Infrastructure Report" and the following line in the body...subscribe.
To obtain a complete copy of the current report proceed to the DHS link below.
To obtain reports more than 10 business days old, send an eMail to DHS_Reports@e-computer-security.com. Be specific as to the reports you wish to receive.

•Researchers found that the Icefog cyberespionage campaign that targeted defense and technology companies in September 2013 also compromised the systems of three U.S. oil and gas companies. – Threatpost

1. January 14, Threatpost – (International) Java version of Icefog espionage campaign hit 3 US oil, gas companies. Kaspersky Lab researchers found that the Icefog cyberespionage campaign that targeted defense and technology companies in Japan and South Korea and that was revealed in September 2013 also compromised the systems of three U.S. oil and gas companies using a Java version of the campaign. The companies were notified of the infection and two had removed the malware from their systems by January 14. Source: http://threatpost.com/java-version-of-icefog-espionage-campaign-hit-3-us-oil-gas-companies/103567

•A 48-inch water main that broke January 13 and flooded a shopping center in Philadelphia lost around 13 million gallons of water and caused at least $3 million in damage. – Philadelphia Inquirer (See item 15)

For another story, see item 27 below in the Information Technology Sector

Information Technology Sector

26. January 14, The Register – (International) Vulnerability leaves Cisco small biz routers wide open to attack. Cisco issued a security advisory January 10 warning that some of its routers and networking products contain a vulnerability that could allow attackers to gain root access via an undocumented test interface. Exploit code for the vulnerability is available, though Cisco reported that they did not observe any widespread attacks based on it. Source: http://www.theregister.co.uk/2014/01/14/cisco_small_business_router_flaw/

Links

About Me

U.S. Army Retired Chief Warrant Officer with more than 40 years in information technology and 35 years in information security. Became a Certified Information Systems Security Professional in 1995 and have taught computer security in Asia, Canada and the United States. Wrote a computer security column for 5 years in the 1980s titled "for the Sake Of Security", penname R. E. (Bob) Johnston, which was published in Computer Decisions.
Motto: "When entrusted to process, you are obligated to safeguard"